11.1 Overview

Secure workstation helps users to secure their workstations. Secure Workstation provides a policy-based framework within which you can control locking the workstation and automatically log out of users based upon several different events, such as:

Secure Workstation is available to both connected and disconnected workstations.

The policy can either be the local policy for disconnected workstation, which can be configured using Policy editor tool, or network policy for connected workstation by using Secure Workstation Post-Login Method for NMAS.

The Network policy is stored in eDirectory.

You can use iManager to configure the policy.

Secure Workstation is a post-login method. It is similar in some ways to the Workstation Access post-login method that shipped with NMAS 2.0. However, Secure Workstation is more secure than Workstation Access, and does not use a screen saver. Secure Workstation provides more features than Workstation Access.

Secure Workstation supports only Windows 2000 and later versions. Windows 98, Windows ME, Windows NT, and other platforms are not supported.

The following two scenarios help you better understand the functioning of Secure Workstation.

Scenario 1: Inactivity Timeout. Assume that Secure Workstation is installed on Markus’ workstation. The timeout period is set for 10 minutes. Markus leaves his workstation to attend a department meeting. After 10 minutes, Secure Workstation locks Markus’ workstation. No one can access information on or through that workstation until Markus returns and unlocks it.

Scenario 2: An Authentication Device Is Removed. Assume that Secure Workstation is installed on all the workstations that Claire uses. Claire is a nurse. Claire logs in to the nursing station’s workstation by using a proximity card. She completes a report and then leaves to assist a patient. She removes the proximity card from the workstation. Secure Workstation shuts down the applications that Claire was using and logs Claire off.

Secure Workstation consists of the following components: